Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-50193
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 Nov, 2024 | 05:54
Updated At-04 May, 2025 | 12:59
Rejected At-
▼CVE Numbering Authority (CNA)
x86/entry_32: Clear CPU buffers after register restore in NMI return

In the Linux kernel, the following vulnerability has been resolved: x86/entry_32: Clear CPU buffers after register restore in NMI return CPU buffers are currently cleared after call to exc_nmi, but before register state is restored. This may be okay for MDS mitigation but not for RDFS. Because RDFS mitigation requires CPU buffers to be cleared when registers don't have any sensitive data. Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/entry/entry_32.S
Default Status
unaffected
Versions
Affected
  • From 50f021f0b985629accf10481a6e89af8b9700583 before 6f44a5fc15b5cece0785bc07453db77d99b0a6de (git)
  • From d54de9f2a127090f2017184e8257795b487d5312 before b6400eb0b347821efc57760221f8fb6d63b9548a (git)
  • From 2e3087505ddb8ba2d3d4c81306cca11e868fcdb9 before 43778de19d2ef129636815274644b9c16e78c66b (git)
  • From ca13d8cd8dac25558da4ee8df4dc70e8e7f9d762 before 227358e89703c344008119be7e8ffa3fdb5b92de (git)
  • From a0e2dab44d22b913b4c228c8b52b2a104434b0b3 before 64adf22c4bc73ede920baca5defefb70f190cdbc (git)
  • From a0e2dab44d22b913b4c228c8b52b2a104434b0b3 before 48a2440d0f20c826b884e04377ccc1e4696c84e9 (git)
  • 51eca9f1fd047b500137d021f882d93f03280118 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/entry/entry_32.S
Default Status
affected
Versions
Affected
  • 6.8
Unaffected
  • From 0 before 6.8 (semver)
  • From 5.10.228 through 5.10.* (semver)
  • From 5.15.169 through 5.15.* (semver)
  • From 6.1.114 through 6.1.* (semver)
  • From 6.6.58 through 6.6.* (semver)
  • From 6.11.5 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/6f44a5fc15b5cece0785bc07453db77d99b0a6de
N/A
https://git.kernel.org/stable/c/b6400eb0b347821efc57760221f8fb6d63b9548a
N/A
https://git.kernel.org/stable/c/43778de19d2ef129636815274644b9c16e78c66b
N/A
https://git.kernel.org/stable/c/227358e89703c344008119be7e8ffa3fdb5b92de
N/A
https://git.kernel.org/stable/c/64adf22c4bc73ede920baca5defefb70f190cdbc
N/A
https://git.kernel.org/stable/c/48a2440d0f20c826b884e04377ccc1e4696c84e9
N/A
Details not found